These policies protect the business in case of theft, damage, or if one of their employees gets injured. 16/9 = Weegy: Whenever an individual stops drinking, the BAL will decrease slowly. t. e. Affirmative action in the United States is a set of laws, policies, guidelines, and administrative practices "intended to end and correct the effects of a specific form of discrimination" [1] that include government-mandated, government-approved, and voluntary private programs. The contractor need not obtain the unions consent to proceed, as long as it follows established disciplinary procedures. Which investigation type is required for an initial Top Secret Clearance? The agreement is the most fundamental document in a construction contract bundle. contractors must report which of these select all that apply. True Select all that apply. Phovoir/Shutterstock. Why do we need to have threat information? An adversary's capability is defined as his ability to do which of the following? Select all that apply. However, the results of negotiations will depend on a variety of factors, such as the parties leverage, bargaining strategy, bargaining objectives, the unions willingness to strike, the contractors ability to continue operating during a strike, the scope and degree of changes desired, the level of support for the union among employees, and the resolve of the contractors management and the government client to resist union pressure. Additionally, such employers must follow non-discrimination and related provisions, as well as comply with a host of recordkeeping, data collection, and technical obligations. Which investigation is used for a periodic reinvestigation of an individual possessing a Secret or Confidential clearance eligibility? The National Labor Relations Act (NLRA) governs the relationship between employers and the unions that represent their employees. The EEO-1 Deadline is March 30 each year, and the VETS-4212 deadline is September 30 each year. look at your operation from both the friendly and adversary perspectives. 1. Select all that apply. In contrast to other FAR provisions, Clause 52.222-50 must appear in all solicitations and contracts. Select all that apply. Which of the following countermeasures can you implement to help reduce technology-associated insider threats? Physical security controls for the control of, access to, and dissemination of the classified information to be presented. 1. There are three sub-sections. Which step of the analytical risk management process includes considering the impact to military and strategic advantage? Security violations are reported to which entity? After a need is identified, the Government Contracting Activity (GCA) ___________________. No specific terms or language is required to be included in a CBA. Contractors must recognize that their obligations under these laws and executive orders also apply to their subcontractors. Assessing a vulnerability in conjunction with the threat, and then determining the impact this would have on an operation if the vulnerability is exploited determines the level of risk. DoD Insider Threat Awareness Quiz_ Nov 2022 (Answered). %PDF-1.6 % Every contractor or subcontractor who performs work covered by the DBA/DBRA must post an Employee Rights under the Davis-Bacon Act poster at the worksite. Some existing federal contracts may also be bilaterally modified to include the FAR EVerify clause after the effective date of the rule. All executive departments and agencies with national security missions. Patterns, stereotypes, and predictable actions are all types of which of the following? If the contractor agrees to provide for increased wages and benefits and its client refuses reimbursement, these additional costs must be paid by the contractor. -Keeping unauthorized backups According to the DCAA, [T]imekeeping procedures and controls on labor charges are areas of utmost concern. One area of the DCAAs attention is whether the contractor has a timekeeping system to track an employees time spent on each work activity. hb```e``: AXr,lnfhs"k;dxk_42v6J An advantage of incorporating the use of OPSEC surveys is that it. To ensure there are enough cleared employees to meet the needs of a contractor companys classified contract workload, To provide the CEO with justification for hiring more cleared employees, To assess whether a cleared employee still requires access to classified information. The domestic delivery services approved for overnight domestic delivery of Secret and Confidential information are listed in the ______________________. Federal contractors must report the names and total compensation for the contractor's five most highly compensated officials and . The acronym EAP stands for _______________ ? Increase its output. The Weegy: A modal verb (also modal, modal auxiliary verb, modal auxiliary) is a type of auxiliary verb that is used to contractors must report which of these to the insider threat program select all that apply, Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. [ ], u.s. government employees and contractors must report which of the following. Which of the following are things that adversaries want to know? They must be allowed to carry over unused paid sick leave from year to year, although contractors can limit accrual to 56 hours. Who administers and oversees the contractor security program? -Active duty military. This would be impractical unless the contractor chooses to adopt the CBA and the health insurance was provided through a union-sponsored plan. Select ALL the correct responses. To assist government contractors, this guide discusses some of the labor and employment laws and regulations that should be considered when pricing and performing a government contract. Use e-Services for Business to submit a Report of Independent Contractor(s) (DE 542).. Mail or Fax. Prime contractors must meet certain reporting requirements before they are able to submit a bid that valued at $50 million or more as of the year 2016. Which of the following is an objective of the DSS CI Directorate? Affirmative Action, OFCCP and Government Contract Compliance, Corporate Governance and Internal Investigations, Restrictive Covenants, Trade Secrets and Unfair Competition, Disability Access Litigation and Compliance, Diversity and Inclusion Efforts that Really Work, Drug Testing and Substance Abuse Management, Environmental, Social and Governance (ESG), OSHA's COVID-19 Vaccination and Testing Emergency Temporary Standard, Employee Rights under the Davis-Bacon Act, E-Verify Manual for Federal Contractors and Subcontractors, Federal Funding Accountability Transparency Act Subaward Reporting System, Labor Board Reinstates Standard Restricting Employee Severance Agreements, Top Five Labor Law Developments for January 2023, Illinois Paid Leave for All Workers Act is Ready for Governors Signature, Name, address, and Social Security Number of each employee, Hourly rates of pay and contributions for fringe benefits or their cash equivalents, If applicable, detailed information on fringe benefits and approved apprenticeship or trainee programs. These reports are submitted to the Federal Funding Accountability Transparency Act Subaward Reporting System. What document does DSS publish and post on its website to change or clarify existing policy requirements in the NISPOM? Contractors must report which of these to the insider threat program? Where are actions, such as Personnel Security Clearance terminations, upgrades, downgrades, and reinstatements, on contractor employees entered? SF 312, Classified Information Nondisclosure Agreement. Personnel security clearance investigation stage, Initiate personnel security clearance process stage. Of the following types of personnel-related information, which is NOT reported to PSMO-I? Weegy: Contractors must report the following to the insider threat program: Efforts to obtain unauthorized access to classified or proprietary information. Post Author: Post published: 16 juin 2022; What step in the OPSEC process is Analyzing Threats? Knowledge of the threat supports all other steps in the OPSEC process. None. -A desire to appear well-informed For example, if the CBA required the predecessor to pay $4.50 per hour to the unions health and welfare fund to provide medical insurance and related benefits, the contractor can spend at least $4.50 per hour on these benefits by either using its medical plan or any other plan. DSS Headquarters, Industrial Security Integration and Application (IP) Programs. Security control measures must provide for security briefings and signed certificates. What is the preferred method of assessing the risk to your organization? contracts. This will allow the contractor to understand the extent to which the PLA will affect the costs of the work and bid accordingly. What legally binding document must be executed between the Department of Defense and a contractor to obtain a facility clearance? Which of the following includes all the steps necessary for processing a facility clearance and a list of the documents and information that the Facility Security Officer (FSO) must gather to prepare for the Facility Clearance Branch (FCB) telephonic survey? -Allowing large amounts of data to be accessed Bargaining impasse often is difficult to establish; the employer must demonstrate both that the parties are deadlocked and that further discussions likely will not lead to an agreement. -Actual, probable, or possible espionage Select all that apply. Because there are so many different types of construction projects, each type of construction contract exists to satisfy the varying needs of all parties involved. Other technical obligations include drafting, implementing, and disseminating a prescribed equal employment opportunity (EEO)/Policy Statement, ensuring that all job postings contain an EEO Tag Line, annually providing all vendors a notice of the employers federal contractor status, incorporating an Equal Opportunity Clause in each of the employers covered subcontracts, notifying all unions of the employers federal contractor status (if applicable), and posting a number of notices on the employers careers website, including an applicant-accessibility statement. Added 77 days ago|11/12/2022 9:28:04 PM Incorporating counterintelligence and threat awareness into a security program can potentially prevent theft, espionage, and loss of life. What Is Form 1099-NEC. The minimum wage rate is annually increased by the Secretary of Labor. These requirements apply not only to the contractors employees working directly on a federal contract, but generally to their entire workforce, including locations where no federal contract work is performed. Select all that apply. endstream endobj startxref One purpose of the National Industrial Security Program (NISP) is to preserve our nations economic and technological interests. Select all that apply. For more information, visit https://www.jacksonlewis.com. -Speeches or books including information about involvement with the Intelligence Community -Improper use of privileged access OPSEC focuses on what type of critical information? Select all that apply All 4 answers A coworker shares that she and her husband are facing foreclosure, and she doesn't know what to do. Which of the following is a technology-related indicator? If a successor contractor timely disavows the previous contractors CBA, it may establish its own terms and conditions of employment, subject to honoring the wages and covered fringe benefits of the CBA required by Section 4c of the SCA as discussed above. This document will set out the . ; Use the DE 542 Print Specifications (PDF) to generate an alternate form. Most inside offenders display concerning behaviors before acting directly against their organization. You must check the box on the Report of Independent Contractor(s) (DE 542) that indicates Ongoing.If there is no set contract amount, you can report when the total payments in a calendar year equal or exceed $600 and check the Ongoing box. -Unauthorized disclosure of classified material. To issue a Facility Clearance (FCL), the Facility Clearance Branch (FCB) reviews which of the following? In addition, covered contractors must self-disclose credible evidence of violations of certain criminal laws or the civil False Claims Act and significant over-payment.. How is the applicants FSO notified if the applicant receive an unfavorable eligibility determination? It also requires: (1) inclusion of sexual orientation and gender identity in EEO Taglines where protected statuses are listed (rather than abbreviated Taglines), and (2) posting of updated EEO is the Law posters. D.EO 13502 (Use of Project Labor Agreements for Federal Construction Projects). While they need not have a written AAP, they must implement an AAP that includes 16 specified requirements that are substantially similar to the obligations for supply and service contractors. in. -Use strong passwords -Employees Procurement contracts for construction covered by the DBA, but not by the DBRA; Concession contracts, including any concessions contract excluded from the SCA by DOLs regulations at 29 CFR 4.133(b); Contracts in connection with federal property or lands and related to offering services for federal employees, their dependents, or the general public (this includes leases). -In written communications DoD Directive 5240.06, CI Awareness and Reporting (CIAR), DoD 5220.22-M, the National Industrial Security Program Operating Manual (NISPOM). An advantage of incorporating OPSEC principles in the planning stage of any operation is that it. The transfer of classified or proprietary information to a system not approved for the classification level or unaccredited or unauthorized systems, individuals, applications, or media is a _________________. Which government entity is responsible for providing National Industrial Security Program (NISP) policy direction? Depending on a number of factors, including the extent of common ownership and control, AAP obligations also may extend to other related companies. Which of the following is NOT a step in the OPSEC process? According to section 10.2.8, the general contractor should report any work-related accident in writing to the owner, and will be responsible for any costs the owner incurs related to the accident. ], Witch one of the following statements best characterizes Arnold s view of world, WHICH OF THE FOLLOWING STATEMENTS IS TRUE ABOUT TECHNOLOGY AND INSIDER THREAT. In writing to your IS Rep at the DSS field office. -Over the phone In addition, because a contractor cannot require a successor contractor to reinstate the grievant, the CBA should state that the contractors back pay and reinstatement obligations end when the contract ends. Stay Safe. 2020 Jackson Lewis P.C. = 2 5/20 How to verify need-to-know in the DoD System of Record before a classified discussion, Physical security procedures and access areas, Policy and procedures for transmitting and/or transporting classified material. 6275 0 obj <> endobj Where can elicitation techniques be used? Enforcement of such a union security provision can leave a contractor with inadequate staffing. Whether or not a Bridge Agreement is negotiated, a successor employer has an obligation to meet with the union and negotiate in good faith for a CBA. Some federal contracts require contractors to have the ability to access classified information. Foreign Ownership, Control, or Influence (FOCI) Operations Division, Personnel Security Management Office for Industry (PSMO-I), Center for Development of Security Excellence (CDSE). ____________ are like pieces of a puzzle an adversary uses to reveal a picture of our operations. Industrial Security Facilities Database (ISFD), National Industrial Security Program Operating Manual (NISPOM). Facility employees may be processed for personnel security clearances concurrently with the processing of, or after the award of, a facilitys FCL.